Use Cases - A SELECTION
-
Attacks from the Internet
-
Building a Vulnerability Management
-
Regular, internal vulnerability scans
-
Vulnerability scanning in critical infrastructure
-
Evaluation of security by insurances
You want to protect your IT infrastructure against attacks from the Internet?
We have 2 solutions for you:
... start quickly and easily with VULCOM SaaS and receive first results
- Simple start without configuration effort (only permission-to-attack and IP address ranges necessary)
- Configuration, maintenance and updates are taken over for you by HACKNER Security Intelligence
- Scans immediately provide first results and recommended actions
- Easy integration of IT technicians via authorizations
... have more control with a full vulnerability management via VULCOM Appliance
- You decide how many scans you perform and where your data is stored
- Integrate your vulnerability management into existing systems, such as your AD for single-sign-on or ticketing systems to handle issues directly
- Take advantage of our managed service and combine the flexibility of the VULCOM Appliance with the worry-free operation of a vulnerability management solution managed by us
You want to centrally manage and distribute vulnerability information and scan results to the people in charge?
We have the right solution for you:
With VULCOM Appliance you get a complete vulnerability management system for every business size:
- Integrate one or more of your vulnerability scanners into one centralized system
- VULCOM Appliance helps to prioritize the vulnerabilities according to a root cause analysis to combat problems where they begin
- Provide results according to the area of responsibility exclusively to the responsible administrators
- Integrate ticketing systems for further, automated processing and keep track of the status in VULCOM
- If you wish, we can also take over the administration of the appliance so that you can concentrate solely on remedying the vulnerabilities
Are you already running vulnerability scans internally or are you planning to do so? You want to leave behind your self-programmed or Excel-based vulnerability management?
We have the right solution for you:
With VULCOM Appliance you get a complete vulnerability management system for every business size:
- Integrate and manage periodic scans of your vulnerability scanners in one centralized system without further development work
- VULCOM Appliance helps prioritize the vulnerabilities according to a root cause analysis to combat problems where they begin
- Provide results according to the area of responsibility exclusively to the responsible administrators
- VULCOM Appliance provides support for rectification, both in German and in English, and does not require any security know-how
- If you wish, we can also take over the administration of the appliance so that you can concentrate solely on remedying the vulnerabilities
Do you have a network with critical components and should not disrupt the availability of the systems?
We have the right solution for you:
With VULCOM Appliance you get an open vulnerability management system for customized purposes:
- Create risk-free security checks yourself and integrate your own scanner directly into VULCOM
- VULCOM Appliance provides you with an interface to easily import new, own vulnerabilities
- Perform periodic reviews with minimal effort and ensure safety in critical environments without risk
- Use the compliance feature of VULCOM to demonstrate compliance with requirements
You are an insurer and you are looking for an automated solution to assess policyholders' IT security?
We have the right solution for you:
Get a comprehensive assessment of corporate security quickly and easily with VULCOM Insurance :
- Manage the security score of all your clients and their changes over time via one dashboard
- Quickly and automatically identify companies' awareness of IT security from the Internet
- Include additional checks, depending on company risk and desired insurance
- Risks from technical attacks from the Internet (for example, automated ransomware attacks)
- Risks of attackers with access to the internal network
- Risks due to email phishing attacks (e.g., shipping known malware)
- Risks due to missing organizational measures (ISMS)
- Communicate the results to the policyholder to minimize the risk of successful attacks